Abstract
Academic makerspaces have become integral hubs of innovation on university campuses, providing students with access to industrial-grade operational technology (OT) such as 3D printers and CNC machines. However, the security posture for these spaces has overwhelmingly focused on physical safety, creating a significant cybersecurity gap. This oversight leaves networked OT vulnerable to cyberattacks, which threaten student intellectual property, expensive equipment, and the integrity of the broader institutional network. This research addresses this critical vulnerability by developing and implementing a secure and scalable cybersecurity model at the Old Dominion University Computer Science Makerspace, founded on two core principles: robust network segmentation and granular software-based access control. Network segmentation is achieved using Virtual Local Area Networks (VLANs) to isolate the makerspace from the main campus network and to further segment critical OT from student-use IT equipment. Concurrently, a "Zero Trust" model is enforced through a custom-built, software-based reservation system that replaces vulnerable physical access tokens by requiring users to authenticate with official university credentials, including two-factor authentication, for "just-in-time" proxied access to specific equipment. By integrating these technical controls with established industry standards like the NIST Cybersecurity Framework, endpoint hardening, and user cybersecurity training, this model provides a holistic, repeatable blueprint for institutions nationwide to protect their valuable assets from the modern threat landscape.
Faculty Advisor/Mentor
Dr. Rui Ning
Document Type
Paper
Disciplines
Cybersecurity
DOI
10.25776/a7m5-fz30
Publication Date
11-14-2025
Upload File
wf_yes
Included in
A Scalable Cybersecurity Model for Academic Makerspaces
Academic makerspaces have become integral hubs of innovation on university campuses, providing students with access to industrial-grade operational technology (OT) such as 3D printers and CNC machines. However, the security posture for these spaces has overwhelmingly focused on physical safety, creating a significant cybersecurity gap. This oversight leaves networked OT vulnerable to cyberattacks, which threaten student intellectual property, expensive equipment, and the integrity of the broader institutional network. This research addresses this critical vulnerability by developing and implementing a secure and scalable cybersecurity model at the Old Dominion University Computer Science Makerspace, founded on two core principles: robust network segmentation and granular software-based access control. Network segmentation is achieved using Virtual Local Area Networks (VLANs) to isolate the makerspace from the main campus network and to further segment critical OT from student-use IT equipment. Concurrently, a "Zero Trust" model is enforced through a custom-built, software-based reservation system that replaces vulnerable physical access tokens by requiring users to authenticate with official university credentials, including two-factor authentication, for "just-in-time" proxied access to specific equipment. By integrating these technical controls with established industry standards like the NIST Cybersecurity Framework, endpoint hardening, and user cybersecurity training, this model provides a holistic, repeatable blueprint for institutions nationwide to protect their valuable assets from the modern threat landscape.